id
stringlengths 13
19
| title
stringlengths 0
256
| description
stringlengths 3
13.3k
| cpes
sequencelengths 0
5.42k
|
---|---|---|---|
GHSA-7pr3-9p48-wx7x | In the Linux kernel, the following vulnerability has been resolved:s390/decompressor: specify __decompress() buf len to avoid overflowHistorically calls to __decompress() didn't specify "out_len" parameter
on many architectures including s390, expecting that no writes beyond
uncompressed kernel image are performed. This has changed since commit
2aa14b1ab2c4 ("zstd: import usptream v1.5.2") which includes zstd library
commit 6a7ede3dfccb ("Reduce size of dctx by reutilizing dst buffer
(#2751)"). Now zstd decompression code might store literal buffer in
the unwritten portion of the destination buffer. Since "out_len" is
not set, it is considered to be unlimited and hence free to use for
optimization needs. On s390 this might corrupt initrd or ipl report
which are often placed right after the decompressor buffer. Luckily the
size of uncompressed kernel image is already known to the decompressor,
so to avoid the problem simply specify it in the "out_len" parameter. | [] |
|
GHSA-p88m-27c7-422h | Cumin (aka MRG Management Console), as used in Red Hat Enterprise MRG 2.5, does not include the HTTPOnly flag in a Set-Cookie header for the session cookie, which makes it easier for remote attackers to obtain potentially sensitive information via script access to this cookie. | [] |
|
CVE-2018-7753 | An issue was discovered in Bleach 2.1.x before 2.1.3. Attributes that have URI values weren't properly sanitized if the values contained character entities. Using character entities, it was possible to construct a URI value with a scheme that was not allowed that would slide through unsanitized. | [
"cpe:2.3:a:mozilla:bleach:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bleach:2.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:bleach:2.1.2:*:*:*:*:*:*:*"
] |
|
CVE-2022-25788 | A maliciously crafted JT file in Autodesk AutoCAD 2022 may be used to write beyond the allocated buffer while parsing JT files. This vulnerability can be exploited to execute arbitrary code. | [
"cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad:*:*:*:*:*:-:*:*",
"cpe:2.3:a:autodesk:autocad:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:-:*:*",
"cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:macos:*:*",
"cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*"
] |
|
GHSA-jr37-6xf9-g2x4 | Sensitive information disclosure due to missing authorization. The following products are affected: Acronis Agent (Linux, macOS, Windows) before build 36119. | [] |
|
CVE-2022-46091 | Cross Site Scripting (XSS) vulnerability in the feedback form of Online Flight Booking Management System v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the airline parameter. | [
"cpe:2.3:a:online_flight_booking_management_system_project:online_flight_booking_management_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-2p6v-c8r2-4f2q | IBM Control Desk 7.6.1 could allow a remote attacker to obtain sensitive information, caused by the failure to set the HTTPOnly flag. A remote attacker could exploit this vulnerability to obtain sensitive information from the cookie. IBM X-Force ID: 219126. | [] |
|
GHSA-xx49-72mm-f757 | Windows NT 4.0 beta allows users to read and delete shares. | [] |
|
GHSA-5633-fxcw-h329 | Cross-Site Request Forgery (CSRF) vulnerability in Foliovision: Making the web work for you Foliopress WYSIWYG allows Cross Site Request Forgery. This issue affects Foliopress WYSIWYG: from n/a through 2.6.18. | [] |
|
CVE-2024-44758 | An arbitrary file upload vulnerability in the component /Production/UploadFile of NUS-M9 ERP Management Software v3.0.0 allows attackers to execute arbitrary code via uploading crafted files. | [
"cpe:2.3:a:erp:management_software:*:*:*:*:*:*:*:*"
] |
|
CVE-2023-45587 | An improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiSandbox version 4.4.1 and 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 allows attacker to execute unauthorized code or commands via crafted HTTP requests | [
"cpe:2.3:a:fortinet:fortisandbox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:fortinet:fortisandbox:4.4.2:*:*:*:*:*:*:*"
] |
|
CVE-2011-1355 | Open redirect vulnerability in IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.39 and 7.0 before 7.0.0.19 allows remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via the logoutExitPage parameter. | [
"cpe:2.3:a:ibm:websphere_application_server:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:6.1.14:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_application_server:7.0.0.17:*:*:*:*:*:*:*"
] |
|
GHSA-49fm-cm32-q45w | startkde in KDE for Caldera OpenLinux 2.3 through 3.1.1 sets the LD_LIBRARY_PATH environment variable to include the current working directory, which could allow local users to gain privileges of other users running startkde via Trojan horse libraries. | [] |
|
GHSA-24q4-rxhj-p299 | Directory traversal vulnerability in chroot function in AtheOS 0.3.7 allows attackers to escape the jail via a .. (dot dot) in the pathname argument to chdir. | [] |
|
GHSA-h7gw-jv92-h37j | Insufficient data validation in QR scanner in Google Chrome on iOS prior to 90.0.4430.72 allowed an attacker displaying a QR code to perform domain spoofing via a crafted QR code. | [] |
|
CVE-2021-31956 | Windows NTFS Elevation of Privilege Vulnerability | Windows NTFS Elevation of Privilege Vulnerability | [
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.17763.1999:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_2019:10.0.17763.1999:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1909:10.0.18363.1621:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.18363.1621:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_10_21h1:10.0.19043.1052:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1809:10.0.19041.1052:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2004:10.0.19041.1052:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_20h2:10.0.19042.1052:*:*:*:*:*:arm64:*",
"cpe:2.3:o:microsoft:windows_server_20h2:10.0.19042.1052:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1507:10.0.10240.18967:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_10_1607:10.0.14393.4467:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2016:10.0.14393.4467:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_7:6.1.7601.25632:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20044:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20045:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_8.1:6.3.9600.20044:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:6.3.9600.20045:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:6.0.6003.21137:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:6.1.7601.25632:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:6.2.9200.23372:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20045:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:6.3.9600.20044:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10_21h1:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*"
] |
GHSA-xp9f-x7wr-8cp4 | Adobe Dimension versions 3.4.7 (and earlier) is affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file. | [] |
|
GHSA-cc65-vj4f-xm35 | An elevation of privilege vulnerability exists when Windows Modules Installer Service improperly handles class object members.A locally authenticated attacker could run arbitrary code with elevated system privileges, aka 'Windows Modules Installer Service Elevation of Privilege Vulnerability'. | [] |
|
CVE-2020-28032 | WordPress before 5.5.2 mishandles deserialization requests in wp-includes/Requests/Utility/FilteredIterator.php. | [
"cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-9196 | The Face authentication component in Aware mobile liveness 2.2.1 sdk 2.2.0 for Knomi allows a Biometrical Liveness authentication bypass via parameter tampering of the /knomi/analyze security_level field. | [
"cpe:2.3:a:aware:knomi:2.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:aware:knomi:2.2.1:*:*:*:*:*:*:*"
] |
|
CVE-2021-46566 | This vulnerability allows remote attackers to execute arbitrary code on affected installations of Bentley MicroStation CONNECT 10.16.0.80. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of JT files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-15027. | [
"cpe:2.3:a:bentley:microstation:*:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:microstation_connect:10.16.0.80:*:*:*:*:*:*:*",
"cpe:2.3:a:bentley:view:*:*:*:*:*:*:*:*"
] |
|
GHSA-3gp5-92h5-h855 | Jenkins Path Traversal vulnerability | Directory traversal vulnerability in Jenkins before 1.583 and LTS before 1.565.3 allows remote authenticated users with the Overall/READ permission to read arbitrary files via unspecified vectors. | [] |
GHSA-6r92-cgxc-r5fg | Denial of service in CBOR library | ImpactDue to this library's use of an inefficient algorithm, it is vulnerable to a denial of service attack when a maliciously crafted input is passed to `DecodeFromBytes` or other CBOR decoding mechanisms in this library.Affected versions _include_ versions 4.0.0 through 4.5.0.This vulnerability was privately reported to me.PatchesThis issue has been fixed in version 4.5.1. Users should use the latest version of this library. (The latest version is not necessarily 4.5.1. Check the [NuGet page](https://www.nuget.org/packages/PeterO.Cbor) to see the latest version's version number.)WorkaroundsAgain, users should use the latest version of this library.In the meantime, note that the inputs affected by this issue are all CBOR maps or contain CBOR maps. An input that decodes to a single CBOR object is not capable of containing a CBOR map if—it begins with a byte other than 0x80 through 0xDF, orit does not contain a byte in the range 0xa0 through 0xBF.Such an input is not affected by this vulnerability and an application can choose to perform this check before passing it to a CBOR decoding mechanism.For more informationIf you have any questions or comments about this advisory:Open an issue in [the CBOR repository](https://github.com/peteroupc/CBOR). | [] |
CVE-2024-2088 | NextScripts: Social Networks Auto-Poster <= 4.4.3 - Authenticated(Subscriber+) Sensitive Information Exposure | The NextScripts: Social Networks Auto-Poster plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.4.3 via the 'nxs_getExpSettings' function. This makes it possible for authenticated attackers, with subscriber access and above, to extract sensitive data including social network API keys and secrets. | [] |
CVE-2024-53285 | Improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability in DDNS Record functionality in Synology Router Manager (SRM) before 1.3.1-9346-10 allows remote authenticated users with administrator privileges to inject arbitrary web script or HTML via unspecified vectors. | [
"cpe:2.3:a:synology:router_manager:*:*:*:*:*:*:*:*"
] |
|
GHSA-chqw-c679-9rg5 | An information disclosure and remote code execution vulnerability in the slinger web server of the BlackBerry QNX Software Development Platform versions 6.4.0 to 6.6.0 could allow an attacker to potentially read arbitrary files and run arbitrary executables in the context of the web server. | [] |
|
GHSA-x6w4-6wg6-779c | XnView Classic for Windows Version 2.40 might allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .rle file, related to "Data from Faulting Address controls Branch Selection starting at ntdll_77df0000!LdrpFindLoadedDllByHandle+0x0000000000000031." | [] |
|
GHSA-mjrf-hfxf-xr5r | Cross-site scripting (XSS) vulnerability in view.php in phpRaid 2.9.5 allows remote attackers to inject arbitrary web script or HTML via the (1) URL query string and the (2) Sort parameter. | [] |
|
GHSA-32xx-934q-wgcw | Untrusted execution path vulnerability in chcod on AIX IBM 5.1.0, 5.2.0, and 5.3.0 allows local users to execute arbitrary programs by modifying the PATH environment variable to point to a malicious "grep" program, which is executed from chcod. | [] |
|
CVE-2016-2386 | SQL injection vulnerability in the UDDI server in SAP NetWeaver J2EE Engine 7.40 allows remote attackers to execute arbitrary SQL commands via unspecified vectors, aka SAP Security Note 2101079. | [
"cpe:2.3:a:sap:netweaver_application_server_java:7.40:*:*:*:*:*:*:*"
] |
|
CVE-2015-8033 | In Textpattern 4.5.7, the password-reset feature does not securely tether a hash to a user account. | [
"cpe:2.3:a:textpattern:textpattern:4.5.7:*:*:*:*:*:*:*"
] |
|
GHSA-5cff-6mj2-j7qq | Vulnerability in the Oracle Commerce Guided Search / Oracle Commerce Experience Manager product of Oracle Commerce (component: Tools and Frameworks). The supported version that is affected is 11.3.1.5. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise Oracle Commerce Guided Search / Oracle Commerce Experience Manager. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle Commerce Guided Search / Oracle Commerce Experience Manager accessible data. CVSS 3.1 Base Score 4.3 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N). | [] |
|
GHSA-3x36-m3fq-9jv8 | SQL injection vulnerability in the login page in flexycms/modules/user/user_manager.php in SimpleHRM 2.3, 2.2, and earlier allows remote attackers to execute arbitrary SQL commands via the username parameter to index.php/user/setLogin. | [] |
|
GHSA-xqrq-qgmp-x7x4 | Revive Adserver before 5.1.0 is vulnerable to a reflected cross-site scripting (XSS) vulnerability via the publicly accessible afr.php delivery script. While this issue was previously addressed in modern browsers as CVE-2020-8115, some older browsers (e.g., IE10) that do not automatically URL encode parameters were still vulnerable. | [] |
|
GHSA-gfp3-9j64-8w7j | ZF Roll Stability Support Plus (RSSPlus)
is vulnerable to an authentication bypass vulnerability targeting
deterministic RSSPlus SecurityAccess service seeds, which may allow an
attacker to remotely (proximal/adjacent with RF equipment or via pivot
from J2497 telematics devices) call diagnostic functions intended for
workshop or repair scenarios. This can impact system availability,
potentially degrading performance or erasing software, however the
vehicle remains in a safe vehicle state. | [] |
|
GHSA-32h4-r3wm-53g5 | Dell BIOS contains an improper input validation vulnerability. A local authenticated malicious user with administrator privileges may potentially exploit this vulnerability in order to modify a UEFI variable. | [] |
|
CVE-2013-6735 | IBM WebSphere Portal 6.0.0.x through 6.0.0.1, 6.0.1.x through 6.0.1.7, 6.1.0.x through 6.1.0.6 CF27, 6.1.5.x through 6.1.5.3 CF27, 7.0.0.x through 7.0.0.2 CF26, and 8.0.0.x through 8.0.0.1 CF08 allows remote attackers to obtain sensitive Java Content Repository (JCR) information via a modified Web Content Manager (WCM) URL. | [
"cpe:2.3:a:ibm:websphere_portal:6.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.0.1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:6.1.5.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:7.0.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:websphere_portal:8.0.0.1:*:*:*:*:*:*:*"
] |
|
CVE-2020-4636 | IBM Resilient OnPrem 38.2 could allow a privileged user to inject malicious commands through Python3 scripting. IBM X-Force ID: 185503. | [
"cpe:2.3:a:ibm:resilient_security_orchestration_automation_and_response:38.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*"
] |
|
GHSA-7h8w-xx2f-hmr7 | readelf.c in GNU Binutils 2017-04-12 has a "cannot be represented in type long" issue, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted ELF file. | [] |
|
CVE-2023-45990 | Insecure Permissions vulnerability in WenwenaiCMS v.1.0 allows a remote attacker to escalate privileges. | [
"cpe:2.3:a:wenwen-ai:wenwenai_cms:1.0:*:*:*:*:*:*:*"
] |
|
CVE-2010-4579 | Opera before 11.00 does not properly constrain dialogs to appear on top of rendered documents, which makes it easier for remote attackers to trick users into interacting with a crafted web site that spoofs the (1) security information dialog or (2) download dialog. | [
"cpe:2.3:a:opera:opera_browser:*:beta:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta4:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta5:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta6:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.0:beta8:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:5.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.0:tp3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.1:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.04:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.05:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.06:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:6.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta1_v2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.03:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.11:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.20:beta7:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.54:update2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:7.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.0:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:8.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.0:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.02:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.12:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.20:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.21:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.22:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.23:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.24:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.25:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.26:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.27:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.63:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:9.64:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.00:beta3:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.01:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.10:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.50:beta2:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.51:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.52:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.53:b:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.54:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.60:beta1:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.61:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.62:*:*:*:*:*:*:*",
"cpe:2.3:a:opera:opera_browser:10.63:*:*:*:*:*:*:*"
] |
|
GHSA-f46r-h7vv-mxcr | Cross-site scripting (XSS) vulnerability in role deletion in the Web-based Development Workbench in SAP HANA DB 1.00.091.00.1418659308 allows remote authenticated users to inject arbitrary web script or HTML via the role name, aka SAP Security Note 2153898. | [] |
|
GHSA-vg97-vhcr-wjv6 | AirTies Air 5343v2 devices with software 1.0.0.18 have XSS via the top.html productboardtype parameter. | [] |
|
CVE-2018-11202 | A NULL pointer dereference was discovered in H5S_hyper_make_spans in H5Shyper.c in the HDF HDF5 1.10.2 library. It could allow a remote denial of service attack. | [
"cpe:2.3:a:hdfgroup:hdf5:1.10.2:*:*:*:*:*:*:*"
] |
|
GHSA-4qqx-hf2g-m26g | This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of U3D files. Crafted data in a U3D file can trigger a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-18653. | [] |
|
GHSA-7845-crfj-phc4 | Script security bypass vulnerability in Jenkins Shared Library Version Override Plugin | Jenkins Shared Library Version Override Plugin 17.v786074c9fce7 and earlier declares folder-scoped library overrides as trusted, so that they're not executed in the Script Security sandbox, allowing attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection. This allows attackers with Item/Configure permission on a folder to configure a folder-scoped library override that runs without sandbox protection. Shared Library Version Override Plugin 19.v3a_c975738d4a_ declares folder-scoped library overrides as untrusted, so that they’re executed in the Script Security sandbox. | [] |
CVE-2020-21474 | File Upload vulnerability in NucleusCMS v.3.71 allows a remote attacker to execute arbitrary code via the /nucleus/plugins/skinfiles/?dir=rsd parameter. | [
"cpe:2.3:a:nucleuscms:nucleuscms:3.71:*:*:*:*:*:*:*"
] |
|
GHSA-cv8j-wfmq-4fjv | In the Linux kernel, the following vulnerability has been resolved:net: sched: fix memory leak in tcindex_partial_destroy_workSyzbot reported memory leak in tcindex_set_parms(). The problem was in
non-freed perfect hash in tcindex_partial_destroy_work().In tcindex_set_parms() new tcindex_data is allocated and some fields from
old one are copied to new one, but not the perfect hash. Since
tcindex_partial_destroy_work() is the destroy function for old
tcindex_data, we need to free perfect hash to avoid memory leak. | [] |
|
GHSA-cgjw-gcp3-vh4m | Microsoft Office 2010, Microsoft Office 2013, and Microsoft Office 2016 allow a remote code execution vulnerability due to the way objects are handled in memory, aka "Microsoft Office Remote Code Execution Vulnerability". | [] |
|
CVE-2023-27168 | An arbitrary file upload vulnerability in Xpand IT Write-back Manager v2.3.1 allows attackers to execute arbitrary code via a crafted jsp file. | [
"cpe:2.3:a:xpand-it:write-back_manager:2.3.1:*:*:*:*:*:*:*"
] |
|
CVE-2019-1219 | An information disclosure vulnerability exists when the Windows Transaction Manager improperly handles objects in memory, aka 'Windows Transaction Manager Information Disclosure Vulnerability'. | [
"cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_10:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_rt_8.1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:itanium:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1903:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*"
] |
|
CVE-2002-2310 | ClickCartPro 4.0 stores the admin_user.db data file under the web document root with insufficient access control on servers other than Apache, which allows remote attackers to obtain usernames and passwords. | [
"cpe:2.3:a:kryptronic:clickcartpro:4.0:*:*:*:*:*:*:*"
] |
|
GHSA-g93q-f2ww-cqcx | Stack-based buffer overflow in the server in IBM Tivoli Storage Manager FastBack 6.1 before 6.1.12 allows remote attackers to cause a denial of service (daemon crash) via unspecified vectors, a different vulnerability than CVE-2015-1924, CVE-2015-1925, CVE-2015-1929, CVE-2015-1930, CVE-2015-1948, CVE-2015-1953, CVE-2015-1954, CVE-2015-1963, CVE-2015-1964, and CVE-2015-1965. | [] |
|
GHSA-gx4f-r59p-mgpx | In PHP before 5.6.39, 7.x before 7.0.33, 7.1.x before 7.1.25, and 7.2.x before 7.2.13, a buffer over-read in PHAR reading functions may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse a .phar file. This is related to phar_parse_pharfile in ext/phar/phar.c. | [] |
|
CVE-2021-1535 | Cisco SD-WAN vManage Information Disclosure Vulnerability | A vulnerability in the cluster management interface of Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the Cisco SD-WAN vManage Software must be in cluster mode. This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to allow the attacker to view sensitive information on the affected system. | [
"cpe:2.3:a:cisco:sd-wan_vmanage:*:*:*:*:*:*:*:*"
] |
GHSA-34wj-ch2p-7g5r | This issue was addressed with improved checks. This issue is fixed in macOS Big Sur 11.4. A non-privileged user may be able to modify restricted settings. | [] |
|
CVE-2020-1968 | Raccoon attack | The Raccoon attack exploits a flaw in the TLS specification which can lead to an attacker being able to compute the pre-master secret in connections which have used a Diffie-Hellman (DH) based ciphersuite. In such a case this would result in the attacker being able to eavesdrop on all encrypted communications sent over that TLS connection. The attack can only be exploited if an implementation re-uses a DH secret across multiple TLS connections. Note that this issue only impacts DH ciphersuites and not ECDH ciphersuites. This issue affects OpenSSL 1.0.2 which is out of support and no longer receiving public updates. OpenSSL 1.1.1 is not vulnerable to this issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v). | [
"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jd_edwards_world_security:a9.4:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.56:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.57:*:*:*:*:*:*:*",
"cpe:2.3:a:oracle:peoplesoft_enterprise_peopletools:8.58:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:ethernet_switch_es2-64_firmware:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:ethernet_switch_es2-64:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:ethernet_switch_es2-72_firmware:2.0.0.14:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:ethernet_switch_es2-72:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m10-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m10-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m10-4_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m10-4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m10-4s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m10-4s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m12-1_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m12-1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m12-2_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m12-2:-:*:*:*:*:*:*:*",
"cpe:2.3:o:fujitsu:m12-2s_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:h:fujitsu:m12-2s:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:ethernet_switch_es1-24_firmware:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:ethernet_switch_es1-24:-:*:*:*:*:*:*:*",
"cpe:2.3:o:oracle:ethernet_switch_tor-72_firmware:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:h:oracle:ethernet_switch_tor-72:-:*:*:*:*:*:*:*"
] |
GHSA-vfgc-wr54-m4r5 | This vulnerability potentially allows unauthorized enumeration of information from the embedded device APIs. An attacker must already have existing knowledge of some combination of valid usernames, device names and an internal system key. For such an attack to be successful the system must be in a specific runtime state. | [] |
|
CVE-2013-4152 | The Spring OXM wrapper in Spring Framework before 3.2.4 and 4.0.0.M1, when using the JAXB marshaller, does not disable entity resolution, which allows context-dependent attackers to read arbitrary files, cause a denial of service, and conduct CSRF attacks via an XML external entity declaration in conjunction with an entity reference in a (1) DOMSource, (2) StAXSource, (3) SAXSource, or (4) StreamSource, aka an XML External Entity (XXE) issue. | [
"cpe:2.3:a:springsource:spring_framework:3.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:m1:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:m2:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:m3:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:m4:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0.m1:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.0.m2:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:springsource:spring_framework:3.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:*:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:3.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:vmware:spring_framework:4.0.0:milestone1:*:*:*:*:*:*"
] |
|
GHSA-955q-2rmr-5vhw | The Session Reliability Service (XTE) in Citrix MetaFrame Presentation Server 3.0, Presentation Server 4.0, and Access Essentials 1.0 and 1.5, allows remote attackers to bypass network security policies and connect to arbitrary TCP ports via a modified address:port string. | [] |
|
CVE-2018-4974 | Adobe Acrobat and Reader versions 2018.011.20038 and earlier, 2017.011.30079 and earlier, and 2015.006.30417 and earlier have a Use-after-free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user. | [
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:classic:*:*:*",
"cpe:2.3:a:adobe:acrobat_reader_dc:*:*:*:*:continuous:*:*:*",
"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
|
GHSA-mh3p-j9c3-vqpj | Cross-site scripting vulnerability exists in VK All in One Expansion Unit versions prior to 9.100.1.0. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who is accessing the web site using the product. | [] |
|
CVE-2024-41710 | A vulnerability in the Mitel 6800 Series, 6900 Series, and 6900w Series SIP Phones, including the 6970 Conference Unit, through R6.4.0.HF1 (R6.4.0.136) could allow an authenticated attacker with administrative privilege to conduct an argument injection attack, due to insufficient parameter sanitization during the boot process. A successful exploit could allow an attacker to execute arbitrary commands within the context of the system. | [
"cpe:2.3:o:mitel:6863i_sip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6865i_sip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6867i_sip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6869i_sip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6873i_sip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6930_sip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6940_sip_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6905_sip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6910_sip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6915_sip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6920_sip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6920w_sip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6930w_sip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6940w_sip_firmware:*:*:*:*:*:*:*:*",
"cpe:2.3:o:mitel:6970_conference_firmware:*:*:*:*:*:*:*:*"
] |
|
GHSA-xx9g-fvg8-hmfw | The API on Winston 1.5.4 devices is vulnerable to CSRF. | [] |
|
CVE-2015-0437 | Unspecified vulnerability in Oracle Java SE 8u25 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Hotspot. | [
"cpe:2.3:a:oracle:jdk:1.8.0:update25:*:*:*:*:*:*",
"cpe:2.3:a:oracle:jre:1.8.0:update25:*:*:*:*:*:*",
"cpe:2.3:o:novell:suse_linux_enterprise_desktop:11.0:sp3:*:*:*:*:*:*"
] |
|
CVE-2022-28417 | Home Owners Collection Management System v1.0 was discovered to contain a SQL injection vulnerability via /hocms/classes/Master.php?f=delete_phase. | [
"cpe:2.3:a:home_owners_collection_management_system_project:home_owners_collection_management_system:1.0:*:*:*:*:*:*:*"
] |
|
GHSA-hqvh-84g9-cp75 | Unspecified vulnerability in the SIP server in SIP Enablement Services (SES) in Avaya Communication Manager 3.1.x and 4.x allows remote authenticated users to cause a denial of service (resource consumption) via unknown vectors. | [] |
|
CVE-2020-10991 | Mulesoft APIkit through 1.3.0 allows XXE because of validation/RestXmlSchemaValidator.java | [
"cpe:2.3:a:mulesoft:aplkit:*:*:*:*:*:*:*:*"
] |
|
CVE-2024-57964 | Insecure Loading of Dynamic Link Libraries in HVAC Energy Saving Program | Insecure Loading of Dynamic Link Libraries have been discovered in HVAC Energy Saving Program, which could allow local attackers to potentially disclose information or execute arbitray code on affected systems.
This issue affects HVAC Energy Saving Program:. | [] |
CVE-2018-0584 | IIJ SmartKey App for Android version 2.1.0 and earlier allows remote attackers to bypass authentication [effect_of_bypassing_authentication] via unspecified vectors. | [
"cpe:2.3:a:iij:smartkey:*:*:*:*:*:android:*:*"
] |
|
CVE-2020-21535 | fig2dev 3.2.7b contains a segmentation fault in the gencgm_start function in gencgm.c. | [
"cpe:2.3:a:xfig_project:fig2dev:3.2.7:b:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"
] |
|
CVE-2019-19218 | BMC Control-M/Agent 7.0.00.000 has Insecure Password Storage. | [
"cpe:2.3:a:bmcsoftware:control-m\\/agent:7.0.00.000:*:*:*:*:*:*:*"
] |
|
CVE-2021-33107 | Insufficiently protected credentials in USB provisioning for Intel(R) AMT SDK before version 16.0.3, Intel(R) SCS before version 12.2 and Intel(R) MEBx before versions 11.0.0.0012, 12.0.0.0011, 14.0.0.0004 and 15.0.0.0004 may allow an unauthenticated user to potentially enable information disclosure via physical access. | [
"cpe:2.3:a:intel:active_management_technology_software_development_kit:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:setup_and_configuration_software:*:*:*:*:*:*:*:*",
"cpe:2.3:a:intel:management_engine_bios_extension:*:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:b560:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:h510:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:h570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:q570:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:w580:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:z590:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:cm246:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8706g_:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c232:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c236:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c422:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:cm236:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:cm238:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8145ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1000g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1000g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1000ng4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-1005g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10100y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10105t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10110u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10110y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10305_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10305t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-10325_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_8100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_8100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_8100f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_8100f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_8100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_8100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_8300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_8300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_8300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_8300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_8350k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_8350k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_9100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_9100:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_9100f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_9100f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_9100t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_9100t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_9300_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_9300:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_9300t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_9300t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_9320_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_9320:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_9350k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_9350k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3_9350kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i3_9350kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8210y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8257u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8365u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8365ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5\\+8400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5\\+8400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5\\+8500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5\\+8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10110y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10200h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10300h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1030g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1030g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1030ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10310u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10310y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g1_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1035g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-1038ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10500te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10505_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-10610u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5-10610u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_10110y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_10110y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_10210y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_10210y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_10310y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_10310y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_8400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_8400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_8400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_8400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_8500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_8500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_8500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_8500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_8600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_8600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_8600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_8600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_8600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_8600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9400:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9400f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9400f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9400t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9400t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9500:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9500f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9500f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9500t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9500t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9600_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9600:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9600k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9600k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9600kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9600kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_9600t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_9600t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_l16g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5_m480_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i5_m480:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8557u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8569u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8665u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8665ue:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:10510u:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:10510y:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7:10710u:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7\\+8700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7\\+8700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10510y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1060g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1060ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10610u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1065g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-1068ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10710u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10750h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10810u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10870h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-10875h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_10510y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_10510y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_1060g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_1060g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_1060ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_1060ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_1065g7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_1065g7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_1068ng7_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_1068ng7:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8086k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8086k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8500y_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8500y:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8550u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8550u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8559u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8559u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8560u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8560u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8565u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8565u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8650u_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8650u:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_8700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_8700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_9700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_9700:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_9700f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_9700f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_9700k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_9700k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_9700kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_9700kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7_9700t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i7_9700t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9:7900x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9:7920x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9:7940x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9:7960x:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9:7980xe:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10850h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10850h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10850k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10885h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900e_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900f_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10910_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-7980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-7980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-8950hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9800x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9800x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9820x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9820x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9880h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900ks_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900ks:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9900x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9900x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9920x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9920x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9940x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9940x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9960x_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9960x:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-9980xe_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9-9980xe:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9_9880h_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9_9880h:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9_9900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9_9900:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9_9900k_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9_9900k:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9_9900kf_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9_9900kf:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9_9900ks_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9_9900ks:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9_9900t_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9_9900t:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9_9980hk_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:core_i9_9980hk:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2123:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2125:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2133:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2135:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2145:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2155:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2175:*:*:*:*:*:*:*",
"cpe:2.3:h:intel:xeon:w2195:*:*:*:*:*:*:*"
] |
|
CVE-2021-3041 | Cortex XDR Agent: Improper control of user-controlled file leads to local privilege escalation | A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version. | [
"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*"
] |
CVE-2021-44680 | An issue (4 of 6) was discovered in Veritas Enterprise Vault through 14.1.2. On start-up, the Enterprise Vault application starts several services that listen on random .NET Remoting TCP ports for possible commands from client applications. These TCP services can be exploited due to deserialization behavior that is inherent to the .NET Remoting service. A malicious attacker can exploit both TCP remoting services and local IPC services on the Enterprise Vault Server. This vulnerability is mitigated by properly configuring the servers and firewall as described in the vendor's security alert for this vulnerability (VTS21-003, ZDI-CAN-14075). | [
"cpe:2.3:a:veritas:enterprise_vault:*:*:*:*:*:*:*:*"
] |
|
CVE-2019-10930 | A vulnerability has been identified in All other SIPROTEC 5 device types with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions ), DIGSI 5 engineering software (All versions < V7.90), SIPROTEC 5 device types 6MD85, 6MD86, 6MD89, 7UM85, 7SA87, 7SD87, 7SL87, 7VK87, 7SA82, 7SA86, 7SD82, 7SD86, 7SL82, 7SL86, 7SJ86, 7SK82, 7SK85, 7SJ82, 7SJ85, 7UT82, 7UT85, 7UT86, 7UT87 and 7VE85 with CPU variants CP300 and CP100 and the respective Ethernet communication modules (All versions < V7.90), SIPROTEC 5 device types 7SS85 and 7KE85 (All versions < V8.01), SIPROTEC 5 device types with CPU variants CP200 and the respective Ethernet communication modules (All versions). A remote attacker could use specially crafted packets sent to port 443/TCP to upload, download or delete files in certain parts of the file system. | [
"cpe:2.3:a:siemens:digsi_5_engineering_software:7.90:*:*:*:*:*:*:*",
"cpe:2.3:a:siemens:siprotec_5_digsi_device_driver:7.90:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6md85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6md86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:6md89:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sa82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sa86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sa87:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sd82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sd86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sd87:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sj82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sj85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sj86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sk82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sk85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sl82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sl86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7sl87:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7um85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ut82:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ut85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ut86:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ut87:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7ve85:-:*:*:*:*:*:*:*",
"cpe:2.3:h:siemens:7vk87:-:*:*:*:*:*:*:*"
] |
|
GHSA-3vh2-7wc2-pg3v | An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory, aka 'Win32k Elevation of Privilege Vulnerability'. This CVE ID is unique from CVE-2019-1256. | [] |
|
CVE-2020-0485 | In areFunctionsSupported of UsbBackend.java, there is a possible access to tethering from a guest account due to a missing permission check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-166125765 | [
"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*"
] |
|
GHSA-vx8w-6r69-h5fv | An issue was discovered in GitLab Community and Enterprise Edition 12.0 through 12.2.1. Under certain conditions, merge request IDs were being disclosed via email. | [] |
|
CVE-2020-8153 | Improper access control in Groupfolders app 4.0.3 allowed to delete hidden directories when when renaming an accessible item to the same name. | [
"cpe:2.3:a:nextcloud:group_folders:*:*:*:*:*:*:*:*",
"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*"
] |
|
GHSA-39m4-87qv-j7j7 | Stack-based buffer overflow in the plugin in Apple QuickTime before 7.7.2 on Windows allows remote attackers to execute arbitrary code or cause a denial of service (application crash) via a crafted QTMovie object. | [] |
|
CVE-2020-4584 | IBM i2 iBase 8.9.13 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system. IBM X-Force ID: 184574. | [
"cpe:2.3:a:ibm:i2_ibase:*:*:*:*:*:*:*:*"
] |
|
GHSA-6gvh-974v-q8vj | OpenJPEG through 2.3.1 has a heap-based buffer overflow in opj_t1_clbl_decode_processor in libopenjp2.so. | [] |
|
GHSA-x5pv-35h7-pm8q | In PuTTY versions before 0.71 on Windows, local attackers could hijack the application by putting a malicious help file in the same directory as the executable. | [] |
|
CVE-2022-1802 | If an attacker was able to corrupt the methods of an Array object in JavaScript via prototype pollution, they could have achieved execution of attacker-controlled JavaScript code in a privileged context. This vulnerability affects Firefox ESR < 91.9.1, Firefox < 100.0.2, Firefox for Android < 100.3.0, and Thunderbird < 91.9.1. | [
"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe:2.3:o:google:android:-:*:*:*:*:*:*:*"
] |
|
CVE-2024-41785 | IBM Concert cross-site scripting | IBM Concert Software 1.0.0 through 1.0.1 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. | [
"cpe:2.3:a:ibm:concert:1.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ibm:concert:1.0.1:*:*:*:*:*:*:*"
] |
CVE-2024-27148 | Local Privilege Escalation and Remote Code Execution using insecure PATH | The Toshiba printers are vulnerable to a Local Privilege Escalation vulnerability. An attacker can remotely compromise any Toshiba printer. As for the affected products/models/versions, see the reference URL. | [
"cpe:2.3:h:toshibatec:e-studio-2521_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2020_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2520_nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2021_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3025_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6525_acg:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3028-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4528-ag:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6528-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6526-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7527-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-6529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-7529-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-9029-a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-330-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-400-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2010-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2110-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2510-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2610-ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3015-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3115-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3515-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3615-nc:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4515_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-4615_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5015_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-5115_ac:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2018_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2518_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-2618_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3018_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3118_a:-:*:*:*:*:*:*:*",
"cpe:2.3:h:toshibatec:e-studio-3118_ag:-:*:*:*:*:*:*:*"
] |
CVE-2006-4802 | Format string vulnerability in the Real Time Virus Scan service in Symantec AntiVirus Corporate Edition 8.1 up to 10.0, and Client Security 1.x up to 3.0, allows local users to execute arbitrary code via an unspecified vector related to alert notification messages, a different vector than CVE-2006-3454, a "second format string vulnerability" as found by the vendor. | [
"cpe:2.3:a:symantec:client_security:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.434:mr3:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.437:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.446:mr4:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.457:mr5:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.460:mr6:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.464:mr7:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.0.1_build_8.01.471:mr8:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.1.1_mr1_build_8.1.1.314a:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.1.1_mr2_build_8.1.1.319:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.1.1_mr3_build_8.1.1.323:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.1.1_mr4_build_8.1.1.329:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.1.1_mr5_build_8.1.1.336:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.7:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.8:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:1.9:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:2.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:2.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:client_security:2.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:8.1:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:8.1.1.319:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:8.1.1.323:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:8.1.1.329:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:8.1.1_build8.1.1.314a:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:9.0:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:9.0.1:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:9.0.1.1.1000:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:9.0.1.1000:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:9.0.2:*:corporate:*:*:*:*:*",
"cpe:2.3:a:symantec:norton_antivirus:9.0.4:*:corporate:*:*:*:*:*"
] |
|
GHSA-vq7p-w2xr-pwxr | Command injection vulnerability in networking of QNAP Q'center Virtual Appliance version 1.7.1063 and earlier could allow authenticated users to run arbitrary commands. | [] |
|
CVE-2014-8322 | Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value. | [
"cpe:2.3:a:aircrack-ng:aircrack-ng:*:*:*:*:*:*:*:*",
"cpe:2.3:a:aircrack-ng:aircrack-ng:1.2:beta1:*:*:*:*:*:*",
"cpe:2.3:a:aircrack-ng:aircrack-ng:1.2:beta2:*:*:*:*:*:*",
"cpe:2.3:a:aircrack-ng:aircrack-ng:1.2:beta3:*:*:*:*:*:*"
] |
|
CVE-2006-5241 | Multiple PHP remote file inclusion vulnerabilities in OpenDock Easy Gallery 1.4 and earlier, when register_globals is enabled, allow remote attackers to execute arbitrary PHP code via a URL in the doc_directory parameter in (1) file.php; (2) find_user.php, (3) lib_user.php, (4) lib_form_user.php, and (5) user.php in sw/lib_user/; (6) find_session.php and (7) session.php in sw/lib_session/; (8) comment.php and (9) lib_comment.php in sw/lib_comment/; and other unspecified PHP scripts. | [
"cpe:2.3:a:opendock:easy_gallery:*:*:*:*:*:*:*:*"
] |
|
CVE-2014-3878 | Multiple cross-site scripting (XSS) vulnerabilities in the web client interface in Ipswitch IMail Server 12.3 and 12.4, possibly before 12.4.1.15, allow remote attackers to inject arbitrary web script or HTML via (1) the Name field in an add new contact action in the Contacts section or unspecified vectors in (2) an Add Group task in the Contacts section, (3) an add new event action in the Calendar section, or (4) the Task section. | [
"cpe:2.3:a:ipswitch:imail_server:12.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ipswitch:imail_server:12.4:*:*:*:*:*:*:*"
] |
|
CVE-2003-1408 | Lotus Domino Server 5.0 and 6.0 allows remote attackers to read the source code for files via an HTTP request with a filename with a trailing dot. | [
"cpe:2.3:a:lotus:domino_server:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:lotus:domino_server:6.0:*:*:*:*:*:*:*"
] |
|
CVE-2002-0503 | Directory traversal vulnerability in boilerplate.asp for Citrix NFuse 1.5 allows remote authenticated users to read arbitrary files via a .. (dot dot) in the NFuse_Template parameter. | [
"cpe:2.3:a:citrix:nfuse:1.5:*:*:*:*:*:*:*"
] |
|
GHSA-7736-7gm2-mw57 | Knowage (formerly SpagoBI) 6.1.1 allows CSRF via every form, as demonstrated by a /knowage/restful-services/2.0/analyticalDrivers/ POST request. | [] |
|
GHSA-9p62-9q9c-q4wv | Improper access control vulnerability in the system date/time setting page of SolarView Compact SV-CPT-MC310 versions prior to Ver.8.10 and SV-CPT-MC310F versions prior to Ver.8.10 allows a remote authenticated attacker to alter system date/time of the affected product. | [] |
|
GHSA-39h6-pqr3-34cv | Improper conditions check in some Intel(R) Xeon(R) processor memory controller configurations when using Intel(R) SGX may allow a privileged user to potentially enable escalation of privilege via local access. | [] |
|
CVE-2021-26877 | Windows DNS Server Remote Code Execution Vulnerability | Windows DNS Server Remote Code Execution Vulnerability | [
"cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:20h2:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:1909:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:2004:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_20h2:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_1909:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2004:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2008_sp2:*:*:*:*:*:*:x86:*",
"cpe:2.3:o:microsoft:windows_server_2008_r2:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012:*:*:*:*:*:*:x64:*",
"cpe:2.3:o:microsoft:windows_server_2012_r2:*:*:*:*:*:*:x64:*"
] |
GHSA-g2f6-h5vw-x98w | A vulnerability classified as problematic was found in Campcodes Complete Web-Based School Management System 1.0. This vulnerability affects unknown code of the file index.php. The manipulation of the argument category leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-263800. | [] |
|
CVE-2002-1322 | Rational ClearCase 4.1, 2002.05, and possibly other versions allows remote attackers to cause a denial of service (crash) via certain packets to port 371, e.g. via nmap. | [
"cpe:2.3:a:rational_software:clearcase:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:rational_software:clearcase:2002-05-00:*:*:*:*:*:*:*"
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.